______ refers to crime that is committed using a computer.
a. Trojan horse
b. Bot crime
c. Cybercrime
d. Identity theft
c. Cybercrime
You might also like to view...
All of the following are examples of ethical challenges that researchers face EXCEPT ______.
a. receiving informed consent b. maintaining anonymity c. maintaining confidentiality d. choosing a proper methodology
What term means to surrender an accused criminal under the provisions of a treaty or statute by one authority to another having jurisdiction?
a. extradition b. jurisdiction c. posse comitatus d. martial law
Evidence alone is not enough to establish probable cause
Indicate whether the statement is true or false
Which of the following includes the use of computers and telecommunications to store, retrieve, transmit, and manipulate data?
a. identification technology b. communication technology c. analytic technology d. information technology